What could kill NSTIC? A Friendly Threat Assessment In Three Parts - - PowerPoint PPT Presentation

what could kill nstic
SMART_READER_LITE
LIVE PREVIEW

What could kill NSTIC? A Friendly Threat Assessment In Three Parts - - PowerPoint PPT Presentation

What could kill NSTIC? A Friendly Threat Assessment In Three Parts January 2013 Phil Wolff Strategy Director Personal Data Ecosystem Consortium phil@pde.cc. @evanwolf. Linkedin Download the whitepaper: http://pde.cc/nsticrisks High hopes for


slide-1
SLIDE 1

What could kill NSTIC?

A Friendly Threat Assessment In Three Parts

January 2013 Phil Wolff

Strategy Director Personal Data Ecosystem Consortium phil@pde.cc. @evanwolf. Linkedin Download the whitepaper: http://pde.cc/nsticrisks

slide-2
SLIDE 2

High hopes for an ID ecosystem

Can we get to an international digital identity system?

slide-3
SLIDE 3

High hopes for an ID ecosystem

Can we get to an International, User-Centric digital identity system that works across Industries? Cultures? Technologies? Governments? Regulatory schemes?

slide-4
SLIDE 4

High hopes for an ID ecosystem

This effort is driven in the United States under a 2004 program initiated by the National Strategy for Trusted Identity in Cyberspace through the National Institute of Standards and Technology (NIST) of the US Department of Commerce.

slide-5
SLIDE 5

Our findings, in short:

a user experience that doesn’t work imbalance among the forces that hold an identity ecosystem together.

The two most serious threats to NSTIC’s success:

slide-6
SLIDE 6

A dozen of us met

  • to list and score threats to the NSTIC

Identity Ecosystem vision.

  • Internet Identity Workshop,

Mountain View, California – October 2012 – May 2011.

slide-7
SLIDE 7

We asked:

If NSTIC fails by 2016, what could have brought it down?

slide-8
SLIDE 8

HERE’S OUR HYPOTHETICAL 2016 POST-MORTEM OF NSTIC FAILURE SCENARIOS

slide-9
SLIDE 9

We spoke in the past-tense as if the failures had happened.

slide-10
SLIDE 10
slide-11
SLIDE 11

We didn’t cooperate to build an ID

  • ecosystem. We should have played

well with others.

slide-12
SLIDE 12

We didn’t cooperate to build an ID

  • ecosystem. We should have played

well with others.

Took too long. Strung out by process problems. (Alternatives emerged.)

slide-13
SLIDE 13

We didn’t cooperate to build an ID

  • ecosystem. We should have played

well with others.

Industry failed to build it. (Capital and management didn’t prioritize.)

slide-14
SLIDE 14

We didn’t cooperate to build an ID

  • ecosystem. We should have played

well with others.

NSTIC community became balkanized. NSTIC community lost cohesion; didn’t listen to each other. (Little to no interop.)

slide-15
SLIDE 15

We didn’t cooperate to build an ID

  • ecosystem. We should have played

well with others.

The program was co-opted by a Big Brother government. (Not trustworthy internationally and for many purposes.)

slide-16
SLIDE 16

Just because it’s built doesn’t mean they’ll use it.

slide-17
SLIDE 17

Just because it’s built doesn’t mean they’ll use it.

Worked, but was not trusted. (Failed Brand).

slide-18
SLIDE 18

Just because it’s built doesn’t mean they’ll use it.

Was subverted and insecure. (Legitimately Untrusted).

slide-19
SLIDE 19

Just because it’s built doesn’t mean they’ll use it.

Enterprise didn’t adopt it. (Business case not well made.)

slide-20
SLIDE 20

Just because it’s built doesn’t mean they’ll use it.

After one failure, supporters abandoned the

  • project. “Burned once, twice shy.”

(Shallow, brittle commitment; low tolerance for failure.)

slide-21
SLIDE 21

Just because it’s built doesn’t mean they’ll use it.

The IE was an empty room. No critical mass

  • formed. There was an imbalance of supply

and demand. (Anchor tenants didn’t sign on. Institutions didn’t enroll millions of users or pull in industry ecosystems.)

slide-22
SLIDE 22

Just because it’s built doesn’t mean they’ll use it.

Citizens didn’t want trusted identity. (Poor market fit; lack of perceived benefit

  • ver alternatives.)
slide-23
SLIDE 23

We didn’t build the right things the right way.

slide-24
SLIDE 24

We didn’t build the right things the right way.

A local failure took down the whole identity ecosystem. (Failures of ecosystem trust, architecture, integration testing, and risk analysis.)

slide-25
SLIDE 25

We didn’t build the right things the right way.

The IdP/RP/Trust identity model was inferior to newer models. (Technology risk.)

slide-26
SLIDE 26

We didn’t build the right things the right way.

The IdP/RP/Trust identity model broke at scale or broke in diverse contexts. (Project design risk.)

slide-27
SLIDE 27

We didn’t build the right things the right way.

Miscommunication within the Identity Ecosystem contributed to its death. (Poor cooperation, weak community, high self-interest, low trust.)

slide-28
SLIDE 28

Failed User Experience.

slide-29
SLIDE 29

Failed User Experience.

UX was too hard.

slide-30
SLIDE 30

Failed User Experience.

Everything went wrong that could go wrong.

slide-31
SLIDE 31

We Built-In Structural Instability.

slide-32
SLIDE 32

We Built-In Structural Instability.

Along with user experience, structural instability was the big issue, according to the group…

slide-33
SLIDE 33

We Built-In Structural Instability.

  • Four pillars of the ecosystem must be

strong

  • Technology
  • Economics
  • Policy
  • Culture
  • Each relationship among them was

imbalanced.

slide-34
SLIDE 34

We Built-In Structural Instability.

Each of these pillars were operating on different tempos.

  • It was fast to iterate improved user

experiences but slow to socialize each round among public policy and enterprise lawyers, for example.

slide-35
SLIDE 35

We Built-In Structural Instability.

Motivations were misaligned.

  • Some companies, for example,

engineered tariffs for data sharing into their terms of service, cutting off public sector and NPOs from their customers.

slide-36
SLIDE 36

We Built-In Structural Instability.

Core ideas didn’t survive translation.

  • Several large Internet engineering

companies backed out of supporting IE infrastructure because the “Easy ID” brand became a running joke on sitcoms, SNL, and a biting meme on YouTube.

slide-37
SLIDE 37

We Built-In Structural Instability.

Liability was broken.

  • Tragic risks were taken with some

technologies and contracts by pushing exposure from those who enabled risk to those who didn’t.

slide-38
SLIDE 38

This session was in October 2012.

  • But wait, there’s more…
slide-39
SLIDE 39
  • 2. EIGHTEEN MONTHS E
  • 2. EIGHTEEN MONTHS EARLIER...

ARLIER...

We did a similar exercise 18 months earlier in May 2011 with a similar group.

https://secure.flickr.com/photos/philwolff/5713880402/ cc-by Phil Wolff

slide-40
SLIDE 40

Key Risks (via 2011):

slide-41
SLIDE 41

Key Risks (via 2011):

Lack of adoption.

slide-42
SLIDE 42

Key Risks (via 2011):

Impatience for long learning curve.

slide-43
SLIDE 43

Key Risks (via 2011):

Usability failures. (early concern)

slide-44
SLIDE 44

Key Risks (via 2011):

Interop failures.

slide-45
SLIDE 45

Key Risks (via 2011):

Overscope.

slide-46
SLIDE 46

Key Risks (via 2011):

Security problems like phishing and malware drawn by money.

slide-47
SLIDE 47

Key Risks (via 2011):

Perversion of principles.

slide-48
SLIDE 48

Key Risks (via 2011):

Chicken vs. Egg problems.

slide-49
SLIDE 49

Key Risks (via 2011):

Short Attention Span and the Hype Cycle

slide-50
SLIDE 50

Key Risks (via 2011):

Regulatory blocks privacy laws antitrust concerns uncertainty about liability

slide-51
SLIDE 51

Key Risks (via 2011):

Waiting for Winners

slide-52
SLIDE 52

Key Risks (via 2011):

Dystopian Fear

slide-53
SLIDE 53

Key Risks (via 2011):

Over-promising by tech communities to policy communities

slide-54
SLIDE 54

Key Risks (via 2011):

  • Lack of adoption.
  • Impatience for long

learning curve.

  • Usability failures.
  • Interop failures.
  • Overscope.
  • Security problems like

phishing and malware drawn by money.

  • Perversion of principles.
  • Chicken vs. Egg problems.
  • Short Attention Span and

the Hype Cycle

  • Regulatory blocks

including privacy laws, antitrust concerns and uncertainty about liability

  • Waiting for Winners
  • Dystopian Fear
  • Over-promising by tech to

policy communities

slide-55
SLIDE 55

We had time, in the 2011 session, to brainstorm what might avoid or mitigate these threats.

slide-56
SLIDE 56

Action:

Small successes Build confidence

slide-57
SLIDE 57

Action:

Industry marketing, PR, Media/Voice Build public understanding

slide-58
SLIDE 58

Action:

Community user experience sharing (KM) Accelerate design

slide-59
SLIDE 59

Action:

Cultivate Engineering Focus Developer relations

slide-60
SLIDE 60

Action:

Governance driving Interop Testing Interop is a leadership challenge

slide-61
SLIDE 61

Action:

Clear/Graded Roadmap Short term plans, long term visions

slide-62
SLIDE 62

Action:

Electronic Authentication Guideline, NIST SP 800-63, and other threat comment Connect to existing NIST processes

slide-63
SLIDE 63

Action:

Security Council / Antiphishing Working Group Make security an explicit IESG activity

slide-64
SLIDE 64

Action:

Government Affairs activity Engage US and other governments

slide-65
SLIDE 65

Action:

OIX Risk Wiki Engage the OIX community

slide-66
SLIDE 66

WHA WHAT CHANGED T CHANGED BETWEEN THE TWO BETWEEN THE TWO SESSIONS? SESSIONS?

The fear of “failure to deliver” was still there.

slide-67
SLIDE 67

What changed between the two sessions?

  • 1. Outside forces like dystopian fear

among users, security failures, and regulatory challenges were less prominent or not mentioned.

  • 2. Drivers of failure expanded almost

exclusively to internal ones.

slide-68
SLIDE 68

What changed between the two sessions?

The primary concern: leadership

Once funding, staffing, and collaboration started: the identity ecosystem did not take charge and master the challenges as they emerged.

slide-69
SLIDE 69

Arbroath Cliffs Warning Notice CC-BY-NC Alan Parkinson

  • 3. Last minute update...
slide-70
SLIDE 70

Cuts are coming

  • US federal government is cutting

spending in 2013 as we prepare this paper in December 2012.

  • By cleaver if a “fiscal cliff avoiding”

budget is passed

  • By chainsaw if Congress and the

President fall over the “cliff.”

slide-71
SLIDE 71

Direct effects.

Nobody knows if this will directly affect NIST and the NIST staff managing the NSTIC project.

slide-72
SLIDE 72

Direct effects.

Could the stream of funding for NSTIC innovation grants dry up and will existing projects be halted?

slide-73
SLIDE 73

Direct effects.

Will NIST’s funding for the Identity Ecosystem’s Secretariat, that coordinates and supports the work of the IE, be sustained or cut?

slide-74
SLIDE 74

Direct effects.

In a trillion dollar budget, today’s spending

  • n NSTIC is a rounding error.
slide-75
SLIDE 75

Indirect effects.

We don’t know how cuts in federal spending will affect the program indirectly Participating organizations change behavior as they

  • lose government contracts,
  • experience greater risk, or
  • enjoy new opportunities.
slide-76
SLIDE 76

eGovernment as customer.

We also don’t know if the largest government agencies that would be among the first implementers of these open, user- centric, trust networks will stay in the game.

slide-77
SLIDE 77

eGovernment as customer.

Having huge customers as “anchor tenants” provides strong incentives for the private sector to invest and make the identity ecosystem work.

slide-78
SLIDE 78

eGovernment as customer.

Will spending cuts interfere with project continuity?

slide-79
SLIDE 79

eGovernment as customer.

Will key personnel stay engaged?

slide-80
SLIDE 80

Lots of unknowns.

  • And no strategy to respond to these risks

from the Identity Ecosystem Steering Group.

  • Yet.
slide-81
SLIDE 81

Our findings, in short:

A user experience that doesn’t work Imbalance among the forces that hold an identity ecosystem together.

The two most serious threats:

slide-82
SLIDE 82

What do you think is the biggest threat to making the dream

  • f an international user-centric digital

identity system that works across industries, technologies, governments, and regulatory schemes

come true?

slide-83
SLIDE 83

Further Reading and Resources

  • https://pensivepeter.wordpress.com/2012/10/23/death-

to-nstic-long-live-nstic/

  • https://skydrive.live.com/?

cid=9a70d9142ec4cc44&id=9A70D9142EC4CC44! 827&sff=1

  • PDEC White paper: What Could NSTIC?
slide-84
SLIDE 84

A word from our sponsors…

  • PDEC is a not-for-profit education, advocacy,

and research association, promoting the emergence of a user-centric personal data ecosystem where personal control of personal data is good for business and society.

  • Our consortium’s Startup Circle and individual

members are in North America, across Europe, Australia and New Zealand

  • We meet at local meetups and conferences

and hold seminars.

slide-85
SLIDE 85

Thanks

Phil Wolff

– phil@pde.cc – @evanwolf – +001.510-444.8234

PDEC, the Personal Data Ecosystem Consortium, is a “small data” NGO representing startups, individuals and others who believe personal control of personal data is good for people, business, and society